Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
32 open access dissertations and theses found for:
if(CAPTCHA)  »   Refine Search
1.
Breaking the Multi Colored Box: A Study of CAPTCHA
by Khanna, Sumit, M.S.Comp.Sci.  The University of Tennessee at Chattanooga. 2009: 103 pages; 1488637.
2.
Using Spammers' Computing Resources for Volunteer Computing
by Bui, Thai Le Quy, M.S.  Portland State University. 2014: 90 pages; 1553892.
3.
An exploration of online spam prevention through geolocational filters
by Boukes, John, M.S.  California State University, Long Beach. 2012: 90 pages; 1522208.
4.
A framework for secure mixnet-based electronic voting
by Popoveniuc, Stefan, Ph.D.  The George Washington University. 2009: 211 pages; 3344934.
5.
Blind and Visually Impaired Users Adaptation to Web Environments: A Qualitative Study
by Saqr, Raneem R., Ph.D.  University of South Florida. 2016: 154 pages; 10142378.
6.
Defending Cross-Site Request Forgery (CSRF) Attacks on Web Applications
by Shaikh, Roshan, D.P.S.  Pace University. 2019: 182 pages; 13904278.
7.
Analysis and Detection of the Silent Thieves
by Perez, Jon, M.S.  Utica College. 2018: 94 pages; 10931156.
8.
A Web-Based Security Framework in .NET Environment
by Melnikov, Arthur, M.S.  California State University, Long Beach. 2010: 107 pages; 1493039.
9.
Structured interactions and collective outcomes essays on production and finance
by Neilson, Daniel H., Ph.D.  Columbia University. 2009: 121 pages; 3393607.
10.
Information theoretic approaches towards regulatory network inference
by Chaitankar, VIjender, Ph.D.  Virginia Commonwealth University. 2012: 125 pages; 3550865.
11.
Battling Spam and Sybils on the Social Web
by Wilson, Christo, Ph.D.  University of California, Santa Barbara. 2012: 329 pages; 3545102.
12.
Enhancing privacy in cryptographic protocols
by Shin, Ji Sun, Ph.D.  University of Maryland, College Park. 2009: 146 pages; 3359424.
13.
14.
Angular Component Library Comparison
by Cebrian, Michael Christopher, M.S.  Villanova University. 2017: 46 pages; 10281632.
16.
Localizing the effects of link flooding attacks in the Internet
by Lee, Soo Bum, Ph.D.  University of Maryland, College Park. 2009: 142 pages; 3397793.
17.
Botnet Detection Using Graph Based Feature Clustering
by Akula, Ravi Kiran, M.S.  Mississippi State University. 2018: 69 pages; 10751733.
18.
Optimization Methods Combining Variable Splitting with Deep Learning
by Cowen, Benjamin, Ph.D.  New York University Tandon School of Engineering. 2019: 136 pages; 13882605.
19.
Darknets, cybercrime & the onion router: Anonymity & security in cyberspace
by Yetter, Richard B., M.S.  Utica College. 2015: 102 pages; 1586579.
20.
Threat Modeling and Circumvention of Internet Censorship
by Fifield, David, Ph.D.  University of California, Berkeley. 2017: 96 pages; 10688573.
21.
User-centric secure cross-site interaction framework for online social networking services
by Ko, Moo Nam, Ph.D.  The University of North Carolina at Charlotte. 2011: 121 pages; 3474321.
22.
Remix and reuse of source code in software production
by Jones, M. Cameron, Ph.D.  University of Illinois at Urbana-Champaign. 2010: 196 pages; 3455917.
23.
Interactive visual prototyping of computer vision applications
by Maynes-Aminzade, Daniel, Ph.D.  Stanford University. 2008: 105 pages; 3332995.
24.
A Framework for Scientific Discovery through Video Games
by Cooper, Seth, Ph.D.  University of Washington. 2011: 128 pages; 3501867.
27.
MS/MS analysis and automated tool development for protein post-translational modifications
by Woodin, Carrie L., Ph.D.  University of Kansas. 2013: 171 pages; 3591745.
28.
Improving the Students' Study Practices Through the Principled Design of Research Probes
by Aleahmad, Turadig, Ph.D.  Carnegie Mellon University. 2012: 146 pages; 3528728.
1 - 30 of 32 displayed.
  1    2   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest